General
-
Target
5cebc27b366a165f72fc0f83b570434b6ae5edae22c0e6023d27c9642b702b48.exe
-
Size
2.4MB
-
Sample
240517-bwanlsbc45
-
MD5
526153cbd86009228ad53cd262a9c6b3
-
SHA1
6bbe6ce1bdd69cfd516170d5abe2fe4379b6bac2
-
SHA256
5cebc27b366a165f72fc0f83b570434b6ae5edae22c0e6023d27c9642b702b48
-
SHA512
9b01653e6f5b80d8497d8aba00aca45b305feaecd13fd4075ff4e1c06d9cb29d96d0422b3dce43d0b96316510f6fad1e2e49b64ac6038725961de98e7ba9d665
-
SSDEEP
49152:TF42UxdKzPsUdtK7iOgwNwjlYrdnXJc9Qn3z4:TC2UxdYZhOIeBXJcu3
Behavioral task
behavioral1
Sample
5cebc27b366a165f72fc0f83b570434b6ae5edae22c0e6023d27c9642b702b48.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5cebc27b366a165f72fc0f83b570434b6ae5edae22c0e6023d27c9642b702b48.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
5cebc27b366a165f72fc0f83b570434b6ae5edae22c0e6023d27c9642b702b48.exe
-
Size
2.4MB
-
MD5
526153cbd86009228ad53cd262a9c6b3
-
SHA1
6bbe6ce1bdd69cfd516170d5abe2fe4379b6bac2
-
SHA256
5cebc27b366a165f72fc0f83b570434b6ae5edae22c0e6023d27c9642b702b48
-
SHA512
9b01653e6f5b80d8497d8aba00aca45b305feaecd13fd4075ff4e1c06d9cb29d96d0422b3dce43d0b96316510f6fad1e2e49b64ac6038725961de98e7ba9d665
-
SSDEEP
49152:TF42UxdKzPsUdtK7iOgwNwjlYrdnXJc9Qn3z4:TC2UxdYZhOIeBXJcu3
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Detects executables packed with SmartAssembly
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-